Vulnerabilities > CVE-2005-2087 - Resource Management Errors vulnerability in Microsoft IE and Internet Explorer

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
CWE-399
nessus
exploit available

Summary

Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionMS Internet Explorer (javaprxy.dll) COM Object Remote Exploit. CVE-2005-2087. Remote exploit for windows platform
idEDB-ID:1079
last seen2016-01-31
modified2005-07-05
published2005-07-05
reporterk-otik
sourcehttps://www.exploit-db.com/download/1079/
titleMicrosoft Internet Explorer javaprxy.dll COM Object Remote Exploit

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS05-037.NASL
descriptionThe remote host contains a version of the JView Profiler module that is vulnerable to a security flaw that may allow an attacker to execute arbitrary code on the remote host by constructing a malicious web page and enticing a victim to visit this web page.
last seen2020-06-01
modified2020-06-02
plugin id18682
published2005-07-12
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18682
titleMS05-037: Vulnerability in JView Profiler Could Allow Code Execution (903235)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(18682);
 script_version("1.35");
 script_cvs_date("Date: 2018/11/15 20:50:29");

 script_cve_id("CVE-2005-2087");
 script_bugtraq_id(14087);
 script_xref(name:"MSFT", value:"MS05-037");
 script_xref(name:"CERT", value:"939605");
 script_xref(name:"EDB-ID", value:"1079");
 script_xref(name:"MSKB", value:"903235");

 script_name(english:"MS05-037: Vulnerability in JView Profiler Could Allow Code Execution (903235)");
 script_summary(english:"Determines the presence of update 903235");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through the web
client.");
 script_set_attribute(attribute:"description", value:
"The remote host contains a version of the JView Profiler module that
is vulnerable to a security flaw that may allow an attacker to execute
arbitrary code on the remote host by constructing a malicious web page
and enticing a victim to visit this web page.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2005/ms05-037");
 script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Windows 2000, XP and
2003.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2005/06/29");
 script_set_attribute(attribute:"patch_publication_date", value:"2005/07/12");
 script_set_attribute(attribute:"plugin_publication_date", value:"2005/07/12");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl","smb_nt_ms05-038.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS05-037';
kb = '903235';

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);


if ( hotfix_check_sp(xp:3, win2003:2, win2k:6) <= 0 ) exit(0);


if ( hotfix_ie_gt(7) != 0 ) exit(0);
if ( hotfix_missing(name:"896727") <= 0 ) exit(0);
if ( hotfix_missing(name:"896688") <= 0 ) exit(0);
if ( hotfix_missing(name:"905915") <= 0 ) exit(0);
if ( hotfix_missing(name:"903235") > 0 )
{
 if (get_kb_item ("SMB/Registry/HKLM/SOFTWARE/Microsoft/Internet Explorer/ActiveX Compatibility/{03D9F3F2-B0E3-11D2-B081-006008039BF0}"))
   exit (0);

 minorversion = get_kb_item("SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Internet Settings/MinorVersion");
 if ( "903235" >!< minorversion ) {
 set_kb_item(name:"SMB/Missing/MS05-037", value:TRUE);
 hotfix_add_report(bulletin:bulletin, kb:kb);
 hotfix_security_hole();
 }
}

Oval

  • accepted2014-02-24T04:00:14.351-05:00
    classvulnerability
    contributors
    • nameHarvey Rubinovitz
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameMaria Mikhno
      organizationALTX-SOFT
    descriptionInternet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
    familywindows
    idoval:org.mitre.oval:def:1326
    statusaccepted
    submitted2005-08-18T04:00:00.000-04:00
    titleIE5.01,SP4 Java Proxy COM Object Instantiation Memory Corruption Vulnerability
    version68
  • accepted2014-02-24T04:00:18.533-05:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameMaria Mikhno
      organizationALTX-SOFT
    descriptionInternet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
    familywindows
    idoval:org.mitre.oval:def:1506
    statusaccepted
    submitted2005-12-26T09:36:00.000-04:00
    titleIE6,SP1 Java Proxy COM Object Instantiation Memory Corruption Vulnerability
    version67
  • accepted2014-02-24T04:00:19.108-05:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameSudhir Gandhe
      organizationTelos
    • nameShane Shaffer
      organizationG2, Inc.
    • nameMaria Mikhno
      organizationALTX-SOFT
    descriptionInternet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
    familywindows
    idoval:org.mitre.oval:def:1518
    statusaccepted
    submitted2005-12-26T09:36:00.000-04:00
    titleIE6:S03 Java Proxy COM Object Instantiation Memory Corruption Vulnerability
    version71
  • accepted2014-02-24T04:03:27.734-05:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameMaria Mikhno
      organizationALTX-SOFT
    descriptionInternet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
    familywindows
    idoval:org.mitre.oval:def:793
    statusaccepted
    submitted2005-12-26T09:36:00.000-04:00
    titleIE6:XP,SP2 Java Proxy COM Object Instantiation Memory Corruption Vulnerability
    version66

Saint

bid14087
descriptionInternet Explorer Javaprxy.dll heap overflow
idwin_patch_ie_javaprxy
osvdb17680
titleie_javaprxy
typeclient